By browsing this site, you are agreeing to our cookie policy. More Information

EnCase Endpoint Security Startup Training

Getting Started Couldn't Be Easier
EnCase® Start Up on-demand product training to let you jump-in and quickly get started with your new software. EnCase® Start Up is available for select Guidance Software products at no cost. You can refer to it whenever you need it; brush-up on features and functionality, or bring a new team member up-to-speed.

On-Demand: The Way You Want It
The on-demand online training format means your training session is there when you need it. You choose the when you want it, and you set the pace.

EnCase Endpoint Security Startup Introduction and Current Issues
This lesson provides an introduction to EnCase® Endpoint Security and provides an overview of what problems we will be addressing using the EnCase® Endpoint Security suite of tools.
Watch it now >>

EnCase Endpoint Security Components
This lesson walks you through the components that are installed with the EnCase® Endpoint Security product and how they interact with each other. It also provides an overview of the individual modules in Endpoint Security and covers the terms used throughout the interface.
Part 1: Watch it now >>
Part 2: Watch it now >>
Part 3: Watch it now >>

Investigation Database Connection
Incidents are managed inside investigations. This lesson discusses how to create a new investigation, what settings are available, and how to navigate inside of an investigation.
Part 1: Watch it now >>
Part 2: Watch it now >>
Part 3: Watch it now >>

Planning and Methodology
This lesson covers the general phases of an attack and phases of network enabled incident response. It also provides and general workflow of completing tasks within the product.
Part 1: Watch it now >>
Part 2: Watch it now >>
Part 3: Watch it now >>

Setting up Sources, Custodians and Targets
Before investigation can begin, you need to identify where the machines are that you want to scan and specify permissions to access those machines. This lesson will allow you to complete these global setup options.
Part 1: Watch it now >>
Part 2: Watch it now >>
Part 3: Watch it now >>

Snapshot and Analysis
Volatile data like logged on users, open ports, and hidden DLLs are all collected through the EnCase® snapshot technology. This lesson will allow you to gather snapshot information from one machine, or a range of machines, remotely either immediately or at a set time and frequency.
Part 1: Watch it now >>
Part 2: Watch it now >>